Cybereason Partners with M.Tech to Strengthen Organizations’ Cybersecurity
December 23, 2021 |
2 minute read
Cybereason Security Team
Cybereason has partnered with M.Tech, one of the largest cybersecurity and network performance solutions distributors in Asia, to provide organizations the ability to predict, detect and respond to cyberattacks at planetary scale and maximum speed across endpoints, networks, identities, the cloud and application workspaces.
M.Tech is a leading cyber security and network performance solutions provider delivering integrated end-to-end cybersecurity to enhance network infrastructure, and provides a host of comprehensive professional services and 24/7 technical service and support, ensuring seamless security operations.
Cybereason is experiencing hypergrowth across North America with 200 percent growth in new and upsell annual contract value (ACV) bookings. In addition, the company recently announced its strategic partnership with Google Cloud to deliver Cybereason XDR powered by Google Chronicle.
Cybereason is one of the fastest-growing cybersecurity companies in the world, having raised more than $700 million in funding and a rapidly expanding customer base. Additional hypergrowth key indicators for the company include:
Launch of a U.S. Government subsidiary Cybereason Government Inc., dedicated to the prevention, detection and response to malicious operations targeting U.S. Government agencies on the federal, state and local level.
$275 Million in crossover financing led by Liberty Strategic Capital, with additional backing provided by Irving Investors, certain funds advised by Neuberger Berman Investment Advisers LLC, and Softbank.
The Cybereason Security Team champions cyber defenders by providing future-ready attack protection that unifies security from the endpoint, to the enterprise, to everywhere the battle moves. The Cybereason Defense Platform combines the industry’s top-rated detection and response (EDR and XDR), next-gen anti-virus (NGAV), and proactive threat hunting to deliver context-rich analysis of every element of a Malop (malicious operation). The result: defenders can end cyber attacks from endpoints to everywhere.